• Title/Summary/Keyword: file management

Search Result 754, Processing Time 0.03 seconds

A Digital Forensic Method for File Creation using Journal File of NTFS File System (NTFS 파일 시스템의 저널 파일을 이용한 파일 생성에 대한 디지털 포렌식 방법)

  • Kim, Tae Han;Cho, Gyu Sang
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.2
    • /
    • pp.107-118
    • /
    • 2010
  • This paper proposes a digital forensic method to a file creation transaction using a journal file($LogFile) on NTFS File System. The journal file contains lots of information which can help recovering the file system when system failure happens, so knowledge of the structure is very helpful for a forensic analysis. The structure of the journal file, however, is not officially opened. We find out the journal file structure with analyzing the structure of log records by using reverse engineering. We show the digital forensic procedure extracting information from the log records of a sample file created on a NTFS volume. The related log records are as follows: bitmap and segment allocation information of MFT entry, index entry allocation information, resident value update information($FILE_NAME, $STANDARD_INFORMATION, and INDEX_ALLOCATION attribute etc.).

A rule based file management tool for facility log files integration in disaster environments

  • Lee, Young-Geol;Lee, Younlae;Kim, Hyunah;Jang, Yeonyi;Park, Minjae
    • Journal of Internet Computing and Services
    • /
    • v.19 no.6
    • /
    • pp.73-82
    • /
    • 2018
  • We often experience complex presence of files within the compute environment. It could be an end-user's desktop environment or a professional part of file management. We would like to suggest one way to manage these different cases of duplicate files. It is a rule-based file management tool, and we want to use it as a tool to consolidate facility management log files. In this paper, we will describe the rule-based file management tools and show examples of how files are managed using them. We are interested in the management of the disaster environment and would like to apply this method to the management of log data related to facilities to be considered in the event of a disaster.

Text File Region Management on Grids (그리드 시스템에서 텍스트 파일 영역 관리)

  • Kim, Seung-Min;Yoo, Suk-I.;Kim, Il-Kon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.7
    • /
    • pp.499-507
    • /
    • 2007
  • In the areas of CAE, CAD and CAO integration & automation technology, the word 'File Wrapping' means a virtualization of TEXT files that supports variables-based I/Os like variable assignments in programming languages. This File Wrapping process is one of the cornerstones of CAE, CAD and GAO integration & automation, and the performance of File Wrapping process, which is depending on the sire of a TEXT file to be accessed and the number of regions and their distribution, has a critical effect on the total performance of the CAE, CAD and CAO integration & automation systems. In this paper, we define TEXT File Region Management which generalizes the main functions of the File Wrapping process, and describe a prototype of TEXT file Region Management which is implemented as a Grid service. After that, the validity of the proposed model and the TEXT File Region Management service are discussed with evaluation results of the prototype.

Study on the Digital File Management Behavior of Undergraduate Students according to the Life Cycle of Digital Object (디지털 객체 생애주기에 따른 대학생의 파일관리 행태 연구)

  • Jee, Yoon-Jae;Lee, Hye-Eun
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.33 no.1
    • /
    • pp.321-343
    • /
    • 2022
  • This study presents the direction of services and policies for digital file management in universities by identifying undergraduate students' digital file management behavior. The research defined the Life Cycle of Digital Objects. In addition, This research collected data from 154 undergraduate students using an online survey on their file Creation, Storing, Naming, Organizing, and Backup based on the Digital File Management Workflow. Also, an in-depth interview was conducted for 8 students, two for each major in engineering, arts, social science, and humanities. The result showed that students mostly used personal computers as storage media and USB drive as backup media and had their own file Naming and Organizing methods. Furthermore, students' satisfaction with digital file management was high when universities supported software and cloud storage. Therefore, this study suggests that universities need to provide services reflecting the students' digital file management behavior.

G-File stored in the location information management algorithm (G-File에 저장된 위치정보 관리 알고리즘)

  • Choi, Sang-Kyoon
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.5
    • /
    • pp.742-748
    • /
    • 2011
  • G-File on the position of the photo shoot pictures with built-in picture file to the user, the location and orientation of the image files using the data refers to the [1]. G-File is to store photo files, photo files and receiving means for receiving input, and picture files, photos and location information extracted by separating the subject's location information with location information and location analysis by means of the corresponding coordinates on the map including the location indicated in the guide means is characterized in that. In this paper, the G-File on the location information stored in the algorithm that can be managed is proposed. G-File on the algorithm used to manage the information to the user, G-File management is to provide convenience.

Research on countermeasures against malicious file upload attacks (악성 파일 업로드 공격 대응방안 연구)

  • Kim, Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.2
    • /
    • pp.53-59
    • /
    • 2020
  • Malicious file upload attacks mean that the attacker to upload or transfer files of dangerous types that can be automatically processed within the web server's environment. Uploaded file content can include exploits, malware and malicious scripts. An attacker can user malicious content to manipulate the application behavior. As a method of detecting a malicious file upload attack, it is generally used to find a file type by detecting a file extension or a signature of the file. However, this type of file type detection has the disadvantage that it can not detect files that are not encoded with a specific program, such as PHP files. Therefore, in this paper, research was conducted on how to detect and block any program by using essential commands or variable names used in the corresponding program when writing a specific program. The performance evaluation results show that it detected specific files effectively using the suggested method.

Dynamic File Migration And Mathematical model in Distributed Computer Systems (분산 시스템에서 동적 파일 이전과 수학적 모델)

  • Moon, Won Sik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.35-40
    • /
    • 2014
  • Many researches have been conducted to achieve improvement in distributed system that connects multiple computer systems via communication lines. Among others, the load balancing and file migration are considered to have significant impact on the performance of distributed system. The dynamic file migration algorithm common in distributed processing system involved complex calculations of decision function necessary for file migration and required migration of control messages for the performance of decision function. However, the performance of this decision function puts significant computational strain on computer. As one single network is shared by all computers, more computers connected to network means migration of more control messages from file migration, causing the network to trigger bottleneck in distributed processing system. Therefore, it has become imperative to carry out the research that aims to reduce the number of control messages that will be migrated. In this study, the learning automata was used for file migration which would requires only the file reference-related information to determine whether file migration has been made or determine the time and site of file migration, depending on the file conditions, thus reflecting the status of current system well and eliminating the message transfer and additional calculation overhead for file migration. Moreover, mathematical model for file migration was described in order to verify the proposed model. The results from mathematical model and simulation model suggest that the proposed model is well-suited to the distributed system.

CPC: A File I/O Cache Management Policy for Compute-Bound Workloads

  • Bahn, Hyokyung
    • International journal of advanced smart convergence
    • /
    • v.11 no.2
    • /
    • pp.1-6
    • /
    • 2022
  • With the emergence of the new era of the 4th industrial revolution, compute-bound workloads with large memory footprint like big data processing increase dramatically. Even in such compute-bound workloads, however, we observe bulky I/Os while loading big data from storage to memory. Although file I/O cache plays a role of accelerating the performance of storage I/O, we found out that the cache hit rate in such environments is not improved even though we increase the file I/O cache capacity because of some special I/O references generated by compute-bound workloads. To cope with this situation, we propose a new file I/O cache management policy that improves the cache hit rate for compute-bound workloads significantly. Trace-driven simulations by replaying file I/O reference logs of compute-bound workloads show that the proposed cache management policy improves the cache hit rate compared to the well-acknowledged CLOCK algorithm by a large margin.

A Social Cultural Approach to Illegal Digital Contents Sharing (디지털콘텐츠 불법 파일공유에 관한 사회문화적 접근)

  • Park, Kyung Ja
    • Knowledge Management Research
    • /
    • v.17 no.1
    • /
    • pp.113-133
    • /
    • 2016
  • Why illegal digital contents sharing happens? This study pays attention to the fact that file sharing is an exchanging behavior between people and it is expanding despite of an illegal behavior and proposes that it is necessary for the phenomenon to be understood from social cultural point of view beyond a personal dimension. Based on the social exchange theory, this study demonstrates effects of file sharing attitudes and continuity, regarding 'group norm', 'popular demand', 'reciprocity' and 'social solidarity' as main factors. The main findings of this study are as followed;- First, it is shown that a tacit agreement of a group on file sharing is a determinant of positive attitude to file sharing and the intent of continual file sharing. Second, it is not found that the social relationship factors that are regarded as potential influential factors on file sharing attitude have effects on file sharing behavior, except for 'group norm'. Unlike previous studies, the results may come from the fact that this study deals with an illegal behavior. The third finding indicates a structural relationship between social relationship factors. When members of a group have more amicable attitude to file sharing including silence or a tacit agreement on file sharing, more people ask illegal sharing of files that they need. Such public demand creates expectation of reciprocity. As reciprocity maintains, social connectedness is strengthened. Then, strong social connectedness escalates the intent to maintain file sharing. It is important to notice that this study promotes understanding of how digital contents sharing happens by structuring and demonstrating influential relationship between characteristic factors of the social relationship.

  • PDF